Your submission was sent successfully! Close

CVE-2012-6075

Published: 31 December 2012

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.

Priority

Medium

Status

Package Release Status
kvm
Launchpad, Ubuntu, Debian
Upstream Needs triage

qemu
Launchpad, Ubuntu, Debian
Upstream Needs triage

Patches:
Vendor: http://www.debian.org/security/2013/dsa-2608
qemu-kvm
Launchpad, Ubuntu, Debian
Upstream Needs triage

Patches:
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb (pt1)
Upstream: http://git.qemu.org/?p=qemu.git;a=commit;h=2c0331f4f7d241995452b99afaf0aab00493334a (pt2)
Vendor: http://www.debian.org/security/2013/dsa-2607
xen
Launchpad, Ubuntu, Debian
Upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.
xen-3.1
Launchpad, Ubuntu, Debian
Upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.
xen-3.2
Launchpad, Ubuntu, Debian
Upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.
xen-3.3
Launchpad, Ubuntu, Debian
Upstream Needs triage

Binaries built from this source package are in Universe and so are supported by the community.

Notes

AuthorNote
mdeslaur
hypervisor packages are in universe. For
issues in the hypervisor, add appropriate
tags to each section, ex:
Tags_xen: universe-binary
kees
qemu and kvm are only included if the Xen issue is in full-virt mode.
seth-arnold
"there will be no more qemu-kvm releases." -- Michael Tokarev
qemu patches should apply to xen's embedded copies
mdeslaur
raring is replacing qemu-kvm with qemu (in progress)

References

Bugs